Logging - Ma-No Tech News & Analysis, Javascript, Angular, React, Vue, Php

59 results for: logging

How to fix excessive MySQL CPU usage

What happens if we realise that a series of databases that we thought were optimised through the use of indexes, have begun to consume CPU usage time of a server to unsuspected limits? Even users have stopped being able to access the server when it had a certain number of visits…

Category : Development   21-12-2022   by Janeth Kent

Sick of Video Games? Here are Some Other Pastimes to Try

Online gaming and video games is one of the most popular ways in which people choose to spend their free time. Given the quality of the recent releases, this isn't something that comes at a surprise either. There are so many different options for people to indulge in. When it…

Category : Technology   29-11-2022   by Janeth Kent

The ultimate cybersecurity checklist for programmers

In today's digital age, cybersecurity has become an essential concern for programmers. With cyber threats on the rise, it is crucial for programmers to adopt robust security practices to protect their code, data, and systems from malicious attacks. To assist programmers in this endeavor, we have compiled the ultimate cybersecurity…

Category : Security   02-06-2023   by Silvia Mazzetta

Top JavaScript libraries and frameworks part 1

JavaScript libraries and frameworks make it easy to develop websites and applications with a wide variety of features and functionality, all with dynamic, flexible and engaging features. According to a 2020 StackOverflow survey, JavaScript remains the most widely used programming language (for the eighth year), with 67.7% of respondents using it. Its…

Category : Javascript   06-05-2021   by Janeth Kent

Network attacks and how to avoid them

Nowadays it is impossible to list all the different types of attacks that can be carried out on a network, as in the world of security this varies continuously. We bring you the most common ones according to the network attack databases, so that we can keep up to date…

Category : Security   03-05-2021   by Silvia Mazzetta

How to hide the you are typing text in a WhatsApp group

With WhatsApp groups there is usually no middle ground: either you like them or you hate them from the first moment you are put -sometimes 'dragged' reflects better- into one. And with the current pandemic situation we live in, groups have exploded in use in the work and family environment. Does…

Category : Social networks   25-03-2021   by Janeth Kent

htaccess Rules to Help Protect from SQL Injections and XSS

This list of rules by no means is a sure bet to secure your web services, but it will help in preventing script-kiddings from doing some basic browsing around. MySQL injection attempts are one of the most common hacking attacks against PHP websites. If your website is hosted on a dedicated…

Category : Security   01-03-2021   by Janeth Kent

How to make the website's dark mode persistent with Local Storage, CSS and JS

Recently we wrote about how to do a switchable alternative color mode or theme, a very useful and popular feature to websites. Today’s article is going to be about how to store a user’s settings on your website, specifically, how to save dark mode settings and restore it when a…

Category : Css   22-12-2020   by

Website Traffic Getting Low? 4 Immediate Action to Take

If you have created a website, I am sure your end objective is to create a strong brand presence, boost engagement, and multiply revenue. An interesting statistic showed that there were 22.31 million internet users at the start of the year, in Australia. This means that there are ample opportunities to…

Category : Web marketing   04-12-2020   by Luigi Nori

Brief History of Biometric Authentication

These days, biometric authentication seems to be part of every little gadget or device we use. You’ve no doubt used it when logging onto your laptop, your tablet, or your cell phone, alongside more ‘old school’ methods like a password or PIN. Governments often use biometric authentication for security access and…

Category : Security   30-11-2020   by Janeth Kent

HTTP Cookies: how they work and how to use them

Today we are going to write about the way to store data in a browser, why websites use cookies and how they work in detail. Continue reading to find out how to implement and manage them - if you're looking for code! Understanding HTTP COOKIES - What are they? Cookies and other types…

Category : Programming   27-11-2020   by

Google Dorks: How to find interesting data and search like hacker

Go the words Google and Hacking together? Well if you thought that we will learn how to use hack Google, you might be wrong. But we can Use Google search engine to find interesting data accidentally exposed to the Internet. Such a simple search bar has the potential to help you also…

Category : Security   03-12-2021   by

A collection of interesting networks and technology aiming at re-decentralizing the Internet

The decentralised web, or DWeb, could be a chance to take control of our data back from the big tech firms. So how does it work? Take a look at this collection of projects aimed to build a decentralized internet. Cloud BitDust - is decentralized, secure and anonymous on-line storage, where only…

Category : Networking   27-08-2020   by Janeth Kent

SEO Mistakes that Need to Be Avoided

In today's digital age, search engine optimization (SEO) plays a critical role in determining the success of any online business. However, implementing SEO strategies can be complex, and mistakes are common. To ensure your website achieves optimal performance and ranks well on search engine result pages (SERPs), it is essential…

Category : Seo & sem   15-06-2023   by Janeth Kent

What Are The Best Methods to Make Money Online

More and more individuals are moving from a regular job they have to work on the internet. This trend continues to grow at quite a rapid speed, and since we depend on the internet a lot these days, it is natural that there is so much money to be made…

Category : Web marketing   12-06-2020   by Silvia Mazzetta

10 Open source tools for security operations (SOC)

As we know, there are many moving parts to building a Security Operations Centre (SOC). From a technological point of view, it is very important to count on open source to identify threats and reduce costs. From a DiD (Defense in Depth) point of view, there are many devices and…

Category : Security   29-11-2019   by Janeth Kent

How to Gain an Edge and Improve Your Engagement Rate on Instagram

Image source: Unsplash.com   Instagram has more than one billion active profiles every month and the platform continues to grow at a rapid speed. This is no surprise given just how popular it has become in recent times.    Given the number of active users, it is no surprise that so many businesses and…

Category : Social networks   20-11-2019   by Silvia Mazzetta

How to Secure Remote Access Using VPN

Using a VPN to get remote access allows users to connect to aSecure server via the internet. Rather than logging into the same server directly, uses instead first login to a VPN which allows them to connect to the server more securely. This goes a long way to protecting the…

Category : Networking   24-04-2020   by Luigi Nori

DevOps, Agile Operations, and Continuous Delivery

  Source: Pixabay   Companies and enterprises across the globe have successfully implemented the Agile methodology of developing software and witnessed many benefits regarding smaller development times. Agile also helped to streamline the processes in various multilevel software development teams. The methodology creates feedback loops all while driving the peace that goes with…

Category : Programming   26-09-2019   by Silvia Mazzetta

How to Find Trending Topics for Your Blog?

One of the huge determinants of a blog’s success is the content. Trending blogs with useful contents are always amazing. On the other hand, a blog with content that does not change or improve lives is useless. One of the key responsibilities of any blogger is to create content that…

Category : Seo & sem   19-08-2019   by

5 Ways to Effectively Market Your Online Business

Creating any business is hard enough. Having people notice your business is a completely new challenge. Similar to Michael Scott’s “declaration” of bankruptcy in The Office doesn’t make it so. Creating a business doesn’t guarantee that people will be lining up the streets or parked in front with tents waiting for…

Category : Web marketing   22-04-2020   by Janeth Kent

4 Tips For Logging in Java

Did you realize there are over 9 million Java programmers in the world? When using this programming language, developers are able to build apps that are both appealing and functional. Learning how to unlock the power of Java will take a lot of time and effort in java test. One of the…

Category : Java   14-01-2020   by Janeth Kent

Unlock Hidden SmartPhone Features with these Secret Codes

Unstructured Supplementary Service Data (USSD), sometimes known as "quick codes" or "feature codes", is an extra-UI protocol, which allows people to access hidden features. This protocol was originally created for GSM phones, but can be found on CDMA devices as well (if that's a bunch of acronym gibberish to you,…

Category : Security   06-11-2022   by Janeth Kent

Most Popular Node.js Frameworks in 2019

Most Popular Node.js Frameworks in 2019

Before Node.js, web developers always faced the issue of having to use different languages for client-side and server-side scripts. JavaScript was traditionally the language for client-side scripting with the HTML code running in the browser. The invention of Node.js in 2009 introduced server-side scripting with JavaScript code running on the…

Category : Javascript   14-02-2019   by Janeth Kent

80 Linux Network Monitor Software & Tools for Managing & Monitoring Unix/Linux Systems

80 Linux Network Monitor Software & Tools for Managing & Monitoring Unix/Linux Systems

It’s hard work monitoring and debugging Linux performance problems, but it’s easier with the right tools at the right time. Finding a Linux Network Monitor tool or Software package for your Critical servers and services that are running on those systems in one of the most (if not the most)…

Category : Security   23-10-2018   by Janeth Kent

Useful Terminal Commands Every Web Developer Should Know About

Useful Terminal Commands Every Web Developer Should Know About

The command line interface (CLI), or Terminal is considered by many to be the Holy Grail of computer management. At one time the CLI was the only way to accomplish anything on a computer; then, the CLI gave way to the graphical user interface (GUI) as the popularity of PCs…

Category : Operating systems   22-06-2018   by Janeth Kent

How To Take Your Website Up A Notch

In order to get your website off the ground then you’re going to want to learn how best to get it noticed and clicked on. If you’re just starting to build your website, then you will need to know how to optimize your site’s success from the very beginning. If…

Category : Ui/ux design   02-05-2020   by Silvia Mazzetta

The Importance of Other People to the Success of Your Website

The Importance of Other People to the Success of Your Website

The old adage about it not being what you know but who you know, although not entirely accurate, does hold a grain of truth. Your first job as a website owner is to know the subject around which your site is based inside and out, so that visitors to your…

Category : Web marketing   27-02-2018   by Janeth Kent

How Our Relationship with the Internet has Changed in the Last 20 Years

With more than 1 billion websites online, it is fair to say the internet has transformed the daily lives of people across the world. It now impacts almost every aspect of a person’s life. Find out how our relationship with the internet has changed in the last 20 years. Fast Adoption On…

Category : News and events   29-04-2021   by Janeth Kent

What You Need to Start a Great Healthcare Blog

What You Need to Start a Great Healthcare Blog

Would you like to start your own healthcare blog? Many people think about setting up this type of resource, but very few of these people eventually make a success of it. However, if you're serious about setting up a great healthcare blog, you need the following things: A Recognized Healthcare Qualification People…

Category : Web marketing   21-09-2017   by Janeth Kent

Useful technical SEO checklist for developers

Let's start from the beginning. What is SEO? When we talk about SEO we are talking about Search Engine Optimisation: we are talking about the organic positioning of a web page in search results. And when we say organic positioning we mean unpaid positioning. SEO is a discipline, strategy or set…

Category : Seo & sem   15-05-2023   by Janeth Kent

4 Online Marketing Tips for Personal Trainers

4 Online Marketing Tips for Personal Trainers

The fitness industry is growing rapidly as more people realize the health benefits of physical exercise. As a result, the demand for personal trainers has never been higher. With the rise in demand, the profession is one of the most competitive today. To stay ahead of the pack, you must market…

Category : Web marketing   27-02-2017   by Janeth Kent

Setup FTP server with VSFTPD in Ubuntu 16.04

Setup FTP server with VSFTPD in Ubuntu 16.04

Introduction FTP, short for File Transfer Protocol, is a network protocol that was once widely used for moving files between a client and server. It has since been replaced by faster, more secure, and more convenient ways of delivering files. Many casual Internet users expect to download directly from their web…

Category : Servers   14-02-2017   by Janeth Kent

Ubuntu servers security: 25 security tools to armor your system

Ubuntu servers security: 25 security tools to armor your system

The Ubuntu repositories contain several useful tools for maintaining a secure network and network administration.This security tools include network scanning,attack detection,Virus Detection etc.   1) Wireshark -- network traffic analyzer Wireshark is a network traffic analyzer, or "sniffer", for Unix and Unix-like operating systems. It is used for network troubleshooting, analysis, software and…

Category : Servers   14-09-2016   by Janeth Kent

PHP Libraries For Summer 2016

PHP Libraries For Summer 2016

Here are our picks for the 12 most useful and interesting open-source PHP libraries that you should check out this summer!   Monolog With Monolog you can create advanced logging systems by sending your PHP logs to files, sockets, databases, inboxes or other web services. The library has over 50 handlers for various…

Category : Php   11-08-2016   by Janeth Kent

Happy 25th birthday WWW !!!

Happy 25th birthday WWW !!!

On this day 25 years ago, August 6, 1991, the world's first website went live to the public from a lab in the Swiss Alps. So Happy 25th Birthday, WWW! It's the Silver Jubilee of the world's first website. The site was created by Sir Tim Berners-Lee, the father of the World…

Category : Technology   06-08-2016   by Janeth Kent

PHP: list of best awesome PHP libraries

PHP: list of best awesome PHP libraries

It is an exciting time to be a PHP developer. There are lots of useful libraries released every day, and with the help of Composer and Github, they are easy to discover and use. Here is a complete list of the coolest that We’ve come across. Package Management Libraries for package and…

Category : Php   27-04-2014   by Janeth Kent

Syncronize Files Between Servers With RSYNC

Syncronize Files Between Servers With RSYNC

Synchronize Files With rsync Synchronizing files from one server to another is quite awesome. You can use it for backups, for keeping web servers in sync, and much more. It's fast and it doesn't take up as much bandwidth as normal copying would. And the best thing is, it can be…

Category : Networking   03-02-2014   by Janeth Kent

Free PHP, HTML, CSS, JavaScript editor (IDE) - Codelobster PHP Edition

Free PHP, HTML, CSS, JavaScript editor (IDE) - Codelobster PHP Edition

For valuable work on creation of sites you need a good comfortable editor necessarily. There are many requiring paid products for this purpose, but we would like to select free of charge very functional and at the same time of simple in the use editor - Codelobster PHP Edition .…

Category : Software   16-01-2014   by Janeth Kent

Build a realtime jQuery plugin

Build a realtime jQuery plugin

Realtime web technologies make it really easy to add live content to previously static web pages. Live content can bring a page alive, retain users and remove the need for them to refresh the page periodically. Realtime updates are generally achieved by connecting to a source of data, subscribing to the…

Category : Javascript   27-08-2013   by Janeth Kent

Learning web design: 29 Sites Producing Podcasts And Screencasts for web Designers And Developers

Learning web design: 29 Sites Producing Podcasts And Screencasts for web Designers And Developers

We’ve gathered some resources and sites that produce audio and video content for web designers and developers. Of course, most of them offer RSS and also iTunes subscription options. And you? Are you subscribed to any of the podcasts/screencasts I listed? If so, which ones? Please share your personal recommendations in the…

Category : Web design   22-08-2013   by Janeth Kent

50 WordPress tutorials for designers and developers

50 WordPress tutorials for designers and developers

Wall Street Journal, Ford, Sony, Katy Perry, GigaOM, CNN. Well-known brands. What do they all have in common? Although you probably won’t find this tagline on their sites anymore, under the hood they are “Powered by WordPress”. As we all know, WordPress is the world's most popular publishing platforms that powers…

Category : Web design   17-07-2013   by Janeth Kent

Who is immune to cyber-crime?

Who is immune to cyber-crime?

Every company is a target.  No industry is safe, or immune to cyber-crime, and although technology in IT security has come a long way, the number of data hacking is growing. Knowing your potential attacker is essential to being prepared to defend your company from hackers and to protect your data. According to…

Category : Security   15-07-2013   by Janeth Kent

50 Fresh Tools for Developers and Designers

50 Fresh Tools for Developers and Designers

Web developers and web designers regularly look for new resources, tools and services to make the search of these ever-growing techniques easier. This overview presents some of the most useful round-ups of time-savers, tools and services for Web designers. As every designer or developer knows, anything that can save you just…

Category : Web design   08-07-2013   by Janeth Kent

Predis: PHP Library for REDIS

Predis: PHP Library for REDIS

Redis is an open source data structure server with an in-memory dataset that does much more than simple key/value storage thanks to its built-in data types. It was started in 2009 by Salvatore Sanfilippo and because of its popularity quickly grew, being chosen by big companies like VMware (who later hired…

Category : Programming   01-07-2013   by Janeth Kent

90 free wordpress themes

90 free wordpress themes

WordPress is one of the most popular Free and Open source blogging, publishing and CMS with lots of flexibility. It started as a blogging CMS but now its used as CMS for building complex website, portfolio and ecommerce websites. This article is an answer for you. Below we have showcased 90…

Category : Web design   11-06-2013   by Janeth Kent

20 Open Source Scripts Applications for Web Developers

20 Open Source Scripts Applications for Web Developers

Open source applications and tools can be handy for web designers and developers on a budget. Nowadays most of the tools and applications are increasingly either employing open source or are built entirely on it. And all of this adds up to an increasing premium on web development skills and…

Category : Programming   11-08-2016   by Janeth Kent

Million of visitors per day with a super cheap  php mysql server using nginx and varnish

Million of visitors per day with a super cheap php mysql server using nginx and varnish

These instructions are the rather verbose, but hopefully easy enough to follow, steps to build a new Linux server using Varnish and Nginx to build a php application on a cheap server , all costing under $15 a month, capable of sustaining million hits per day, (we use blitz.io to…

Category : Networking   28-05-2013   by Janeth Kent

Ubuntu UFW Firewall - Uncomplicated Firewall for Ubuntu

Ubuntu UFW Firewall - Uncomplicated Firewall for Ubuntu

Introduction to UFW - Uncomplicated Firewall The default firewall configuration tool for Ubuntu is ufw. Developed to ease iptables firewall configuration, ufw provides a user friendly way to create an IPv4 or IPv6 host-based firewall. By default UFW is disabled. Gufw is a GUI that is available as a frontend. Basic Syntax and…

Category : Networking   27-05-2013   by Janeth Kent

Weekly Design and Development News #2

Weekly Design and Development News #2

Red Pen It lets you upload your design, share a short URL and get feedback super-fast. There’s no logging in, no project management, no bullshit. CSS Modal The CSS Modal is built out of pure CSS. The modal is designed using responsive web design methods so it works on all screen sizes from…

Category : Web design   26-05-2013   by Janeth Kent

Thousands of Tumblr blogs migrate to Wordpress after Yahoo deal

Thousands of Tumblr blogs migrate to Wordpress after Yahoo deal

It's official: Yahoo have purchased blogging giant Tumblr for $1.1 billion in cash, of which CEO David Karp will receive $250 million. Yahoo has gone through a spate of purchasing hot startups recently, such as GoPollGo and Summly, but none of the acquisitions have been on the scale of Tumblr.  And it would seem that…

Category : News and events   20-05-2013   by Janeth Kent

50 Top Tools for Social Media Monitoring, Analytics, and Management

50 Top Tools for Social Media Monitoring, Analytics, and Management

To start a business that will succeed in today's connected world, we need to build a community around our company, brand, and products. It can be noticed how, the last decade, social media monitoring has become a primary form of business intelligence, used to identify, predict, and respond to consumer behavior. Listening to what our…

Category : Social networks   15-05-2013   by Janeth Kent

Tips for Writing Content that Ranks in 2013

Tips for Writing Content that Ranks in 2013

There are many schools of thought as to how best to optimize a website for top keyword placements in search engine results.  The concept of search engine optimization is basically a science, but like most sciences, there is no definitive "right" answer, just a series of practices that tend to work in…

Category : Web marketing   12-05-2013   by Janeth Kent

Google+ Resources to Help You Create a Strategy for Success

Google+ Resources to Help You Create a Strategy for Success

  A successful SEO campaign includes a Google+ strategy, yet many companies are still not thinking about Google+ as such a crucial aspect for SEO. Your typical social media benefits are obvious—on-site engagement, targeted messages, connections and referrals, etc.—but the benefits in terms of ranking on a SERP are still being…

Category : Social networks   03-05-2013   by Janeth Kent

Top Google Website Optimization Resources

Top Google Website Optimization Resources

Search engine optimization (SEO) professionals, web designers, and bloggers read a lot of tips from various experts to stay fresh and up on the current trends in website optimization. But what does Google have to offer on the subject? Find out in this collection of tips, guides, resources, and tutorials…

Category : Web marketing   26-04-2013   by Janeth Kent

The Best Experimental Chrome Features You Should Check Out

The Best Experimental Chrome Features You Should Check Out

Google Chrome is a great browser as it is, but that doesn't mean it doesn't come with its share of annoyances and curiosities. You can fix some of these, as well as add new features by playing around with Chrome's experimental settings. Here are a few we really like. When you…

Category : Software   24-04-2013   by Janeth Kent

13 Ways to Drive More Website Traffic from Your Facebook Page

13 Ways to Drive More Website Traffic from Your Facebook Page

Would you like to drive more website traffic from your Facebook page? Combining your Facebook page and your website can have a powerful affect on your business. You can use your Facebook page to attract thousands to millions of fans and then use them to drive website traffic to generate leads, increase…

Category : Web marketing   24-04-2013   by Janeth Kent

Free Tools For JavaScript Developers

JavaScript is one of the most widely used programming languages in the world, powering countless web applications and websites. As a JavaScript developer, having access to the right tools can greatly enhance your productivity and efficiency. In this article, we have compiled a list of free tools that every JavaScript…

Category : Javascript   21-06-2023   by Janeth Kent

Reset Linux root password without knowing the password

So there it goes - Linux is a secure OS. No, really it is. Despite the title of this post, Linux is actually a secure system. Before we proceed to the main topic, let us consider a few points: Linux is flexible to a very large extent. Linux's administrator account is called…

Category : Operating systems   30-04-2021   by Janeth Kent

q=logging Clicky